From z/OS TSS STIG
Part of ZUSS0048
Associated with IA controls: DCCS-1, DCCS-2
Top Secret ACIDs that use z/OS UNIX facilities must be properly defined. If these attributes are not correctly defined, data access or command privilege controls could be compromised.
a) Refer to the following report produced by the TSS Data Collection: - TSSCMDS.RPT(STATUS) - TSSCMDS.RPT(OMVSUSER) NOTE: This check only applies to the OMVS default user. If the OMVS default user is not defined in the STATUS report, this is NOT APPLICABLE. b) If OMVS default user account is defined as follows, there is NO FINDING: 1) A unique UID number (except for UID(0) users) 2) A non-writable HOME directory 3) Shell program specified as “/bin/echo”, or “/bin/false” NOTE: The shell program must have one of the specified values. The HOME directory must have a value (i.e., not be allowed to default). c) If the user account is not defined as specified in (b) above, this is a FINDING.
Use of the OMVS default UID will not be allowed on any classified system. - The definition of the OMVS default user will be restricted to a non-0 UID, a non-writable home directory, such as "\" root, and a non-executable, but existing, binary file, "/bin/false" or “/bin/echo.” - Collection of SMF type 80 records to track user access to OMVS default UID.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer